Follow
Tim Leek
Tim Leek
MIT Lincoln Laboratory
Verified email at ll.mit.edu
Title
Cited by
Cited by
Year
Topic detection and tracking: event-based information organization
J Allan
Springer Science & Business Media, 2002
12352002
A hidden Markov model information retrieval system
DRH Miller, T Leek, RM Schwartz
Proceedings of the 22nd annual international ACM SIGIR conference on …, 1999
6841999
Taint-based directed whitebox fuzzing
V Ganesh, T Leek, M Rinard
2009 IEEE 31st International Conference on Software Engineering, 474-484, 2009
5152009
Lava: Large-scale automated vulnerability addition
B Dolan-Gavitt, P Hulin, E Kirda, T Leek, A Mambretti, W Robertson, ...
2016 IEEE symposium on security and privacy (SP), 110-121, 2016
4452016
Virtuoso: Narrowing the semantic gap in virtual machine introspection
B Dolan-Gavitt, T Leek, M Zhivich, J Giffin, W Lee
2011 IEEE symposium on security and privacy, 297-312, 2011
4302011
Testing static analysis tools using exploitable buffer overflows from open source code
M Zitser, R Lippmann, T Leek
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on …, 2004
3882004
Speech and language technologies for audio indexing and retrieval
J Makhoul, F Kubala, T Leek, D Liu, L Nguyen, R Schwartz, A Srivastava
Proceedings of the IEEE 88 (8), 1338-1353, 2000
2472000
Information extraction using hidden Markov models
TR Leek
University of California, San Diego, 1997
2381997
Phonetic speaker recognition with support vector machines
W Campbell, J Campbell, D Reynolds, D Jones, T Leek
Advances in neural information processing systems 16, 2003
2132003
Repeatable reverse engineering with PANDA
B Dolan-Gavitt, J Hodosh, P Hulin, T Leek, R Whelan
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 1-11, 2015
2012015
High-level speaker verification with support vector machines
WM Campbell, JR Campbell, DA Reynolds, DA Jones, TR Leek
2004 IEEE International Conference on Acoustics, Speech, and Signal …, 2004
1122004
Tappan zee (north) bridge: mining memory accesses for introspection
B Dolan-Gavitt, T Leek, J Hodosh, W Lee
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1112013
Experiences in cyber security education
J Werther, M Zhivich, T Leek, N Zeldovich
The MIT Lincoln Laboratory Capture-theflag Exercise. In Proceedings of the …, 2011
702011
Sok: Enabling security analyses of embedded systems via rehosting
A Fasano, T Ballo, M Muench, T Leek, A Bulekov, B Dolan-Gavitt, M Egele, ...
Proceedings of the 2021 ACM Asia conference on computer and communications …, 2021
692021
Probabilistic approaches to topic detection and tracking
T Leek, R Schwartz, S Sista
Topic detection and tracking: event-based information organization, 67-83, 2002
682002
BBN at TREC7: Using hidden Markov models for information retrieval
DRH Miller, T Leek, RM Schwartz
NIST SPECIAL PUBLICATION SP, 133-142, 1999
651999
Information retrieval system
RM Schwartz, DRH Miller, TR Leek
US Patent 7,162,468, 2007
562007
The fun and future of {CTF}
A Davis, T Leek, M Zhivich, K Gwinnup, W Leonard
2014 USENIX Summit on Gaming, Games, and Gamification in Security Education …, 2014
552014
Malrec: Compact Full-Trace Malware Recording for Retrospective Deep Analysis
G Severi, T Leek, B Dolan-Gavitt
Detection of Intrusions and Malware, and Vulnerability Assessment: 15th …, 2018
542018
Experiences in Cyber Security Education: The {MIT} Lincoln Laboratory {Capture-the-Flag} Exercise
J Werther, M Zhivich, T Leek, N Zeldovich
4th Workshop on Cyber Security Experimentation and Test (CSET 11), 2011
512011
The system can't perform the operation now. Try again later.
Articles 1–20